Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 898285 Details for
Bug 1100203
[abrt] gdb: bp_location_dtor(): gdb killed by SIGSEGV
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
File: backtrace
backtrace (text/plain), 9.70 KB, created by
Jonas Jonsson
on 2014-05-22 09:05:02 UTC
(
hide
)
Description:
File: backtrace
Filename:
MIME Type:
Creator:
Jonas Jonsson
Created:
2014-05-22 09:05:02 UTC
Size:
9.70 KB
patch
obsolete
>[New LWP 17559] >[Thread debugging using libthread_db enabled] >Using host libthread_db library "/lib64/libthread_db.so.1". >warning: File "/var/cache/abrt-di/usr/lib/debug/usr/lib64/libpython2.7.so.1.0.debug-gdb.py" auto-loading has been declined by your `auto-load safe-path' set to "$debugdir:$datadir/auto-load:/usr/bin/mono-gdb.py". >To enable execution of this file add > add-auto-load-safe-path /var/cache/abrt-di/usr/lib/debug/usr/lib64/libpython2.7.so.1.0.debug-gdb.py >line to your configuration file "/home/jonasj/.gdbinit". >To completely disable this security protection add > set auto-load safe-path / >line to your configuration file "/home/jonasj/.gdbinit". >For more information about this security protection see the >"Auto-loading safe path" section in the GDB manual. E.g., run from the shell: > info "(gdb)Auto-loading safe path" >Core was generated by `gdb --interpreter mi2 --nx'. >Program terminated with signal SIGSEGV, Segmentation fault. >#0 __GI___libc_free (mem=0x300000000) at malloc.c:2892 >2892 if (chunk_is_mmapped(p)) /* release mmapped memory. */ > >Thread 1 (Thread 0x7fa428e9b840 (LWP 17559)): >#0 __GI___libc_free (mem=0x300000000) at malloc.c:2892 > ar_ptr = <optimized out> > p = <optimized out> > hook = 0x0 >#1 0x00000000005382dd in bp_location_dtor () >No symbol table info available. >#2 0x000000000053c4b6 in decref_bp_location () >No symbol table info available. >#3 0x00000000005450d6 in bpstat_clear () >No symbol table info available. >#4 0x000000000059a4e3 in clear_proceed_status_callback () >No symbol table info available. >#5 0x00000000005ad244 in iterate_over_threads () >No symbol table info available. >#6 0x000000000059ceac in clear_proceed_status () >No symbol table info available. >#7 0x00000000005985ce in continue_1 () >No symbol table info available. >#8 0x00000000004ebdcd in exec_continue.isra.0 () >No symbol table info available. >#9 0x00000000004eea99 in mi_execute_command () >No symbol table info available. >#10 0x00000000004e9dcd in mi_execute_command_input_handler () >No symbol table info available. >#11 0x00000000005b8f44 in process_event () >No symbol table info available. >#12 0x00000000005b92d7 in gdb_do_one_event () >No symbol table info available. >#13 0x00000000005b9507 in start_event_loop () >No symbol table info available. >#14 0x00000000005b23c3 in captured_command_loop () >No symbol table info available. >#15 0x00000000005b04ca in catch_errors () >No symbol table info available. >#16 0x00000000005b3096 in captured_main () >No symbol table info available. >#17 0x00000000005b04ca in catch_errors () >No symbol table info available. >#18 0x00000000005b3c54 in gdb_main () >No symbol table info available. >#19 0x0000000000457d1e in main () >No symbol table info available. >From To Syms Read Shared Object Library >0x0000003195014f50 0x0000003195033768 Yes /lib64/libreadline.so.6 >0x0000003441a064a0 0x0000003441a18fe4 Yes /lib64/libselinux.so.1 >0x0000003194406d50 0x0000003194420454 Yes /lib64/libncurses.so.5 >0x000000319100ce40 0x0000003191018ba8 Yes /lib64/libtinfo.so.5 >0x000000317a802210 0x000000317a80e930 Yes /lib64/libz.so.1 >0x000000317ac05890 0x000000317ac74bb8 Yes /lib64/libm.so.6 >0x000000317a000ed0 0x000000317a0019d0 Yes /lib64/libdl.so.2 >0x000000317a4059f0 0x000000317a411614 Yes /lib64/libpthread.so.0 >0x0000003192000f10 0x0000003192001804 Yes /lib64/libutil.so.1 >0x0000003f5883f3d0 0x0000003f58925d90 Yes /lib64/libpython2.7.so.1.0 >0x0000003180403e00 0x000000318041ccdc Yes /lib64/libexpat.so.1 >0x00000034416030e0 0x0000003441619050 Yes /lib64/liblzma.so.5 >0x000000317c402af0 0x000000317c412218 Yes /lib64/libgcc_s.so.1 >0x0000003179c1f560 0x0000003179d60bb4 Yes /lib64/libc.so.6 >0x000000317b401770 0x000000317b44b8e8 Yes /lib64/libpcre.so.1 >0x0000003179800b10 0x0000003179819c70 Yes /lib64/ld-linux-x86-64.so.2 >0x00007fa422671f80 0x00007fa422676c84 Yes /usr/lib64/python2.7/lib-dynload/itertoolsmodule.so >0x00007fa422469520 0x00007fa42246bbfc Yes /usr/lib64/python2.7/lib-dynload/_collectionsmodule.so >0x00007fa4222600e0 0x00007fa422262254 Yes /usr/lib64/python2.7/lib-dynload/operator.so >0x00007fa422057e50 0x00007fa422058fc4 Yes /usr/lib64/python2.7/lib-dynload/_heapq.so >0x00007fa421e54680 0x00007fa421e557e8 Yes /usr/lib64/gconv/UTF-32.so >0x00007fa42198f820 0x00007fa421992ca4 Yes /lib64/libthread_db.so.1 >0x00007fa420e1f240 0x00007fa420e25ee4 Yes /lib64/libnss_files.so.2 >$1 = 0x0 >No symbol "__glib_assert_msg" in current context. >rax 0x0 0 >rbx 0x293a790 43231120 >rcx 0x0 0 >rdx 0x0 0 >rsi 0x0 0 >rdi 0x300000000 12884901888 >rbp 0x25f23f8 0x25f23f8 >rsp 0x7fffe6384218 0x7fffe6384218 >r8 0x1 1 >r9 0x10 16 >r10 0x8 8 >r11 0x246 582 >r12 0x257eda0 39316896 >r13 0x59a4b0 5874864 >r14 0x2209020 35688480 >r15 0x26640e0 40255712 >rip 0x3179c8034c 0x3179c8034c <__GI___libc_free+28> >eflags 0x10206 [ PF IF RF ] >cs 0x33 51 >ss 0x2b 43 >ds 0x0 0 >es 0x0 0 >fs 0x0 0 >gs 0x0 0 >st0 *value not available* >st1 *value not available* >st2 *value not available* >st3 *value not available* >st4 *value not available* >st5 *value not available* >st6 *value not available* >st7 *value not available* >fctrl *value not available* >fstat *value not available* >ftag *value not available* >fiseg *value not available* >fioff *value not available* >foseg *value not available* >fooff *value not available* >fop *value not available* >xmm0 *value not available* >xmm1 *value not available* >xmm2 *value not available* >xmm3 *value not available* >xmm4 *value not available* >xmm5 *value not available* >xmm6 *value not available* >xmm7 *value not available* >xmm8 *value not available* >xmm9 *value not available* >xmm10 *value not available* >xmm11 *value not available* >xmm12 *value not available* >xmm13 *value not available* >xmm14 *value not available* >xmm15 *value not available* >mxcsr *value not available* >Dump of assembler code for function __GI___libc_free: > 0x0000003179c80330 <+0>: mov 0x337b89(%rip),%rax # 0x3179fb7ec0 > 0x0000003179c80337 <+7>: mov (%rax),%rax > 0x0000003179c8033a <+10>: test %rax,%rax > 0x0000003179c8033d <+13>: jne 0x3179c80402 <__GI___libc_free+210> > 0x0000003179c80343 <+19>: test %rdi,%rdi > 0x0000003179c80346 <+22>: je 0x3179c80400 <__GI___libc_free+208> >=> 0x0000003179c8034c <+28>: mov -0x8(%rdi),%rax > 0x0000003179c80350 <+32>: lea -0x10(%rdi),%rcx > 0x0000003179c80354 <+36>: test $0x2,%al > 0x0000003179c80356 <+38>: jne 0x3179c80380 <__GI___libc_free+80> > 0x0000003179c80358 <+40>: test $0x4,%al > 0x0000003179c8035a <+42>: lea 0x3383ff(%rip),%rdi # 0x3179fb8760 <main_arena> > 0x0000003179c80361 <+49>: je 0x3179c8036f <__GI___libc_free+63> > 0x0000003179c80363 <+51>: mov %rcx,%rax > 0x0000003179c80366 <+54>: and $0xfffffffffc000000,%rax > 0x0000003179c8036c <+60>: mov (%rax),%rdi > 0x0000003179c8036f <+63>: xor %edx,%edx > 0x0000003179c80371 <+65>: mov %rcx,%rsi > 0x0000003179c80374 <+68>: jmpq 0x3179c7c950 <_int_free> > 0x0000003179c80379 <+73>: nopl 0x0(%rax) > 0x0000003179c80380 <+80>: mov 0x337e4e(%rip),%edx # 0x3179fb81d4 <mp_+52> > 0x0000003179c80386 <+86>: test %edx,%edx > 0x0000003179c80388 <+88>: jne 0x3179c803b8 <__GI___libc_free+136> > 0x0000003179c8038a <+90>: cmp 0x337e1f(%rip),%rax # 0x3179fb81b0 <mp_+16> > 0x0000003179c80391 <+97>: jbe 0x3179c803b8 <__GI___libc_free+136> > 0x0000003179c80393 <+99>: cmp $0x2000000,%rax > 0x0000003179c80399 <+105>: ja 0x3179c803b8 <__GI___libc_free+136> > 0x0000003179c8039b <+107>: and $0xfffffffffffffff8,%rax > 0x0000003179c8039f <+111>: lea (%rax,%rax,1),%rdx > 0x0000003179c803a3 <+115>: mov %rax,0x337e06(%rip) # 0x3179fb81b0 <mp_+16> > 0x0000003179c803aa <+122>: mov %rdx,0x337def(%rip) # 0x3179fb81a0 <mp_> > 0x0000003179c803b1 <+129>: jmp 0x3179c803bc <__GI___libc_free+140> > 0x0000003179c803b3 <+131>: nopl 0x0(%rax,%rax,1) > 0x0000003179c803b8 <+136>: and $0xfffffffffffffff8,%rax > 0x0000003179c803bc <+140>: mov -0x10(%rdi),%rdx > 0x0000003179c803c0 <+144>: mov %rcx,%rdi > 0x0000003179c803c3 <+147>: lea (%rax,%rdx,1),%rsi > 0x0000003179c803c7 <+151>: mov 0x337a62(%rip),%rax # 0x3179fb7e30 > 0x0000003179c803ce <+158>: sub %rdx,%rdi > 0x0000003179c803d1 <+161>: mov %rsi,%rdx > 0x0000003179c803d4 <+164>: mov 0x18(%rax),%rax > 0x0000003179c803d8 <+168>: or %rdi,%rdx > 0x0000003179c803db <+171>: sub $0x1,%rax > 0x0000003179c803df <+175>: test %rax,%rdx > 0x0000003179c803e2 <+178>: jne 0x3179c80408 <__GI___libc_free+216> > 0x0000003179c803e4 <+180>: subl $0x1,0x337ddd(%rip) # 0x3179fb81c8 <mp_+40> > 0x0000003179c803eb <+187>: sub %rsi,0x337de6(%rip) # 0x3179fb81d8 <mp_+56> > 0x0000003179c803f2 <+194>: jmpq 0x3179cef8f0 <munmap> > 0x0000003179c803f7 <+199>: nopw 0x0(%rax,%rax,1) > 0x0000003179c80400 <+208>: repz retq > 0x0000003179c80402 <+210>: mov (%rsp),%rsi > 0x0000003179c80406 <+214>: jmpq *%rax > 0x0000003179c80408 <+216>: mov %rcx,%rdi > 0x0000003179c8040b <+219>: jmpq 0x3179c1ffba <munmap_chunk> >End of assembler dump.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1100203
: 898285 |
898286
|
898287
|
898288
|
898289
|
898290
|
898291
|
898292
|
898294
|
898295
|
898296